/*- * Copyright (c) 2002-2003 Networks Associates Technology, Inc. * All rights reserved. * * This software was developed for the FreeBSD Project by ThinkSec AS and * Network Associates Laboratories, the Security Research Division of * Network Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 * ("CBOSS"), as part of the DARPA CHATS research program. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote * products derived from this software without specific prior written * permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * $P4: //depot/projects/openpam/include/security/openpam.h#28 $ */ #ifndef _SECURITY_OPENPAM_H_INCLUDED #define _SECURITY_OPENPAM_H_INCLUDED /* * Annoying but necessary header pollution */ #include #ifdef __cplusplus extern "C" { #endif struct passwd; /* * API extensions */ int openpam_borrow_cred(pam_handle_t *_pamh, const struct passwd *_pwd); void openpam_free_data(pam_handle_t *_pamh, void *_data, int _status); void openpam_free_envlist(char **_envlist); const char * openpam_get_option(pam_handle_t *_pamh, const char *_option); int openpam_restore_cred(pam_handle_t *_pamh); int openpam_set_option(pam_handle_t *_pamh, const char *_option, const char *_value); int pam_error(pam_handle_t *_pamh, const char *_fmt, ...); int pam_get_authtok(pam_handle_t *_pamh, int _item, const char **_authtok, const char *_prompt); int pam_info(pam_handle_t *_pamh, const char *_fmt, ...); int pam_prompt(pam_handle_t *_pamh, int _style, char **_resp, const char *_fmt, ...); int pam_setenv(pam_handle_t *_pamh, const char *_name, const char *_value, int _overwrite); int pam_vinfo(pam_handle_t *_pamh, const char *_fmt, va_list _ap); int pam_verror(pam_handle_t *_pamh, const char *_fmt, va_list _ap); int pam_vprompt(pam_handle_t *_pamh, int _style, char **_resp, const char *_fmt, va_list _ap); /* * Read cooked lines. * Checking for _IOFBF is a fairly reliable way to detect the presence * of , as SUSv3 requires it to be defined there. */ #ifdef _IOFBF char * openpam_readline(FILE *_f, int *_lineno, size_t *_lenp); #endif /* * Log levels */ enum { PAM_LOG_DEBUG, PAM_LOG_VERBOSE, PAM_LOG_NOTICE, PAM_LOG_ERROR }; /* * Log to syslog */ void _openpam_log(int _level, const char *_func, const char *_fmt, ...) #if defined(__GNUC__) __attribute__((__format__(__printf__, 3, 4))) #endif ; #if defined(__STDC_VERSION__) && (__STDC_VERSION__ >= 199901L) #define openpam_log(lvl, ...) \ _openpam_log((lvl), __func__, __VA_ARGS__) #elif defined(__GNUC__) && (__GNUC__ >= 3) #define openpam_log(lvl, ...) \ _openpam_log((lvl), __func__, __VA_ARGS__) #elif defined(__GNUC__) && (__GNUC__ >= 2) && (__GNUC_MINOR__ >= 95) #define openpam_log(lvl, fmt...) \ _openpam_log((lvl), __func__, ##fmt) #elif defined(__GNUC__) && defined(__FUNCTION__) #define openpam_log(lvl, fmt...) \ _openpam_log((lvl), __FUNCTION__, ##fmt) #else void openpam_log(int _level, const char *_format, ...); #endif /* * Generic conversation function */ struct pam_message; struct pam_response; int openpam_ttyconv(int _n, const struct pam_message **_msg, struct pam_response **_resp, void *_data); extern int openpam_ttyconv_timeout; /* * Null conversation function */ int openpam_nullconv(int _n, const struct pam_message **_msg, struct pam_response **_resp, void *_data); /* * PAM primitives */ enum { PAM_SM_AUTHENTICATE, PAM_SM_SETCRED, PAM_SM_ACCT_MGMT, PAM_SM_OPEN_SESSION, PAM_SM_CLOSE_SESSION, PAM_SM_CHAUTHTOK, /* keep this last */ PAM_NUM_PRIMITIVES }; /* * Dummy service module function */ #define PAM_SM_DUMMY(type) \ PAM_EXTERN int \ pam_sm_##type(pam_handle_t *pamh, int flags, \ int argc, const char *argv[]) \ { \ return (PAM_IGNORE); \ } /* * PAM service module functions match this typedef */ struct pam_handle; typedef int (*pam_func_t)(struct pam_handle *, int, int, const char **); /* * A struct that describes a module. */ typedef struct pam_module pam_module_t; struct pam_module { char *path; pam_func_t func[PAM_NUM_PRIMITIVES]; void *dlh; int refcount; pam_module_t *prev; pam_module_t *next; }; /* * Source-code compatibility with Linux-PAM modules */ #if defined(PAM_SM_AUTH) || defined(PAM_SM_ACCOUNT) || \ defined(PAM_SM_SESSION) || defined(PAM_SM_PASSWORD) #define LINUX_PAM_MODULE #endif #if defined(LINUX_PAM_MODULE) && !defined(PAM_SM_AUTH) #define _PAM_SM_AUTHENTICATE 0 #define _PAM_SM_SETCRED 0 #else #undef PAM_SM_AUTH #define PAM_SM_AUTH #define _PAM_SM_AUTHENTICATE pam_sm_authenticate #define _PAM_SM_SETCRED pam_sm_setcred #endif #if defined(LINUX_PAM_MODULE) && !defined(PAM_SM_ACCOUNT) #define _PAM_SM_ACCT_MGMT 0 #else #undef PAM_SM_ACCOUNT #define PAM_SM_ACCOUNT #define _PAM_SM_ACCT_MGMT pam_sm_acct_mgmt #endif #if defined(LINUX_PAM_MODULE) && !defined(PAM_SM_SESSION) #define _PAM_SM_OPEN_SESSION 0 #define _PAM_SM_CLOSE_SESSION 0 #else #undef PAM_SM_SESSION #define PAM_SM_SESSION #define _PAM_SM_OPEN_SESSION pam_sm_open_session #define _PAM_SM_CLOSE_SESSION pam_sm_close_session #endif #if defined(LINUX_PAM_MODULE) && !defined(PAM_SM_PASSWORD) #define _PAM_SM_CHAUTHTOK 0 #else #undef PAM_SM_PASSWORD #define PAM_SM_PASSWORD #define _PAM_SM_CHAUTHTOK pam_sm_chauthtok #endif /* * Infrastructure for static modules using GCC linker sets. * You are not expected to understand this. */ #if defined(__FreeBSD__) #define PAM_SOEXT ".so" #else #ifndef NO_STATIC_MODULES #define NO_STATIC_MODULES #endif #endif #if defined(__GNUC__) && !defined(__PIC__) && !defined(NO_STATIC_MODULES) /* gcc, static linking */ #include #include #define OPENPAM_STATIC_MODULES #define PAM_EXTERN static #define PAM_MODULE_ENTRY(name) \ static char _pam_name[] = name PAM_SOEXT; \ static struct pam_module _pam_module = { _pam_name, { \ _PAM_SM_AUTHENTICATE, _PAM_SM_SETCRED, _PAM_SM_ACCT_MGMT, \ _PAM_SM_OPEN_SESSION, _PAM_SM_CLOSE_SESSION, _PAM_SM_CHAUTHTOK }, \ NULL, 0, NULL, NULL }; \ DATA_SET(_openpam_static_modules, _pam_module) #else /* normal case */ #define PAM_EXTERN #define PAM_MODULE_ENTRY(name) #endif #ifdef __cplusplus } #endif #endif